CN115063546A - Method for delineating range of security pillar from open air to underground - Google Patents

Method for delineating range of security pillar from open air to underground Download PDF

Info

Publication number
CN115063546A
CN115063546A CN202210639890.5A CN202210639890A CN115063546A CN 115063546 A CN115063546 A CN 115063546A CN 202210639890 A CN202210639890 A CN 202210639890A CN 115063546 A CN115063546 A CN 115063546A
Authority
CN
China
Prior art keywords
dtm
curve
pillar
range
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210639890.5A
Other languages
Chinese (zh)
Other versions
CN115063546B (en
Inventor
杨念哥
陈树林
李亮
马涛
周科平
潘征
董秋平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Pangang Group Mining Co Ltd
Original Assignee
Central South University
Pangang Group Mining Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University, Pangang Group Mining Co Ltd filed Critical Central South University
Priority to CN202210639890.5A priority Critical patent/CN115063546B/en
Publication of CN115063546A publication Critical patent/CN115063546A/en
Application granted granted Critical
Publication of CN115063546B publication Critical patent/CN115063546B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T17/00Three dimensional [3D] modelling, e.g. data description of 3D objects
    • G06T17/05Geographic models
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/10Geometric CAD
    • G06F30/13Architectural design, e.g. computer-aided architectural design [CAAD] related to design of buildings, bridges, landscapes, production plants or roads
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A10/00TECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE at coastal zones; at river basins
    • Y02A10/40Controlling or monitoring, e.g. of flood or hurricane; Forecasting, e.g. risk assessment or mapping

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Geometry (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Graphics (AREA)
  • Remote Sensing (AREA)
  • Architecture (AREA)
  • Civil Engineering (AREA)
  • Structural Engineering (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Lining And Supports For Tunnels (AREA)

Abstract

The invention discloses a method for delineating the range of an open-air to underground security pillar, which comprises the following steps: determining a safe collapse zone; fitting with a surface DTM surface; extracting a fitting curve; rapidly generating a DTM surface; form H 0 -mh horizontal section line; judging whether a section line penetrates through the No. m DTM surface; acquiring a theoretical boundary of a security pillar; and obtaining the boundary of the security pillar. Software, theory and actual engineering are combined together to this application, compare in directly deriving security personnel pillar boundary according to rock angle of movement one step in place, and the security personnel pillar ore pillar that this method obtained is more level and simple, also is more convenient for security personnel pillar to keep somewhere the construction, does benefit to the recovery of security personnel pillar resource.

Description

Method for delineating range of security pillar from open air to underground
Technical Field
The invention belongs to the technical field of mining, and particularly relates to a method for delineating the range of an open-air-to-underground security pillar.
Background
After the underground ore is mined, the balance state of the stress of the original rock is destroyed, and in the process of forming from the original balance being destroyed to the new balance, the rock stratum moves and deforms to different degrees, and the stress is redistributed. For some mines there are buildings and structures on the surface and therefore the surface is not allowed to settle significantly unevenly. Huge loss is caused by underground mining sedimentation every year in China, and in order to reduce the loss to the minimum, the effective control of the ground surface sedimentation caused by mining is imperative.
In order to effectively avoid the damage of underground mining to ground buildings and structures, the reserved security pillars are a reliable method. But also can cause that the resource can not be extracted in time, and meanwhile, if the range of the security pillar is not defined reasonably, the extraction technical conditions of the security pillar are seriously worsened, which is not beneficial to the recovery of the security pillar resource and causes the loss of a large amount of high-quality mineral resources.
In order to improve the recovery rate of mineral resources, ensure the continuity of production capacities of different levels, prolong the service life of a mine and ensure the safety of surface buildings and structures, a security pillar range which can realize economy and ensure safety has great significance for the development of the mine.
Disclosure of Invention
The invention mainly aims to provide a method for delineating the range of a security pillar from open pit to underground, which aims to solve the problem of delineating the boundary of the security pillar during the underground mining of a metal mine, ensure that the boundary is more reasonable and improve the reliability of the delineation of the range of the security pillar.
Therefore, the method for delineating the range from open air to underground security pillars provided by the embodiment of the invention comprises the following steps:
step 1, determining a safety collapse zone
Aiming at a protected object, checking corresponding standards and specifications, and determining the position and the length of a safety collapse zone;
step 2, fitting with a ground DTM (digital terrestrial model) surface
Fitting the safety collapse zone obtained in the step (1) with a surface DTM surface comprising an open pit so that points on the collapse zone fall on the surface DTM surface as far as possible;
and step 3: extracting fitting curves
Extracting a fitting curve on the basis of fitting the safe collapse zone and the ground surface DTM surface;
step 4, downward expansion of the fitted curve
Expanding the fitted curve obtained in the step 3 downwards by a height of 2h according to the rock movement angle theta to obtain a derivation curve; wherein h is the segment height;
step 5, rapidly generating DTM surface
Rapidly generating a DTM surface in 3DMine software based on the derivation curve obtained in the step 4 and the fitting curve obtained in the step 3, numbering the DTM surface as m, and setting the initial value of m as 1;
step 6, forming H 0 Horizontal section line of-mh
Based on elevation H 0 -mh cut profile, thereby forming H 0 Horizontal section line of-mh, H 0 The average elevation of the earth surface is taken;
step 7, judging whether the section line penetrates through the DTM surface
If the curve is intersected, combining the section line and the overflow boundary to form a new fitting curve, making m equal to m +1, returning to the step 4, forming a DTM surface by the new fitting curve and a derivation curve of the new fitting curve in the step 5, and sequentially performing other steps; if the section line does not penetrate through the DTM surface, entering the next step;
step 8, obtaining the theoretical boundary of the security pillar
By deleting redundant point and t-corner pairs H 0 -mh horizontal section lines are trimmed, and each horizontal security pillar theoretical boundary is deduced by using the trimmed plane curves;
and step 9: obtaining security pillar boundaries
And (4) optimizing the boundary of the step (8) according to the actual engineering arrangement, medium and long term mining plan and the principle of simplicity and convenience in construction to obtain a more reasonable security pillar boundary.
Specifically, the length of the safety collapse zone in the step 1 is not less than 5 times of the distance between the safety collapse zone and the protected object according to an arc-shaped curve formed by the outer contour of the protected object.
Specifically, the range of the surface DTM surface in step 2 is greater than the range of the deposit.
Specifically, at least 90% of the points on the collapsed zone in step 2 fall on the surface DTM surface.
Specifically, in step 7, the overflow boundary is a portion on the left side or the right side of an intersection point of the curve with the larger horizontal elevation and the curve with the smaller horizontal elevation after the section line intersects the two curves.
Specifically, the actual engineering in step 9 includes development engineering, mining engineering, long-term medium-term mine planning, and geological structure.
Specifically, the protection objects in step 1 include buildings, roads and other natural protection landscapes.
Compared with the prior art, at least one embodiment of the invention has the following beneficial effects: the method fits the acquired collapse zone with the DTM surface of the ground surface, fully considers the change of the trend of the ground surface and the influence of open-pit mining, ensures the reliability of the theoretical boundary of the security pillar by utilizing the 3DMine function and artificial correction, and optimizes the theoretical boundary based on the arrangement condition of actual engineering to obtain the security pillar boundary which is more convenient to construct.
In conclusion, the method combines software, theory and actual engineering, and compared with the method of directly deducing the boundary of the security pillar in one step according to the rock movement angle, the security pillar obtained by the method is smoother and simpler, is more convenient for security pillar retention construction, is beneficial to recovery of security pillar resources, and has the characteristics of safety, economy, applicability and the like.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flow chart of a method for delineating the range of an open-pit to underground security pillar according to an embodiment of the present invention;
FIG. 2 is a schematic view of a safety collapse zone determined by an embodiment of the present invention;
FIG. 3 is a schematic diagram of a fit of a safety collapse zone to an actual DTM plane according to an embodiment of the present invention;
FIG. 4 is a graph of a fit obtained by an embodiment of the present invention;
FIG. 5 is a graph of the development achieved by an embodiment of the present invention;
FIG. 6 is a schematic diagram of generating a DTM surface No. 1 using a fitting curve and a broadening curve according to an embodiment of the invention;
FIG. 7 is a cross-sectional view of a 1570m cut according to an embodiment of the present invention;
FIG. 8 is a schematic view of a combination curve according to an embodiment of the present invention;
FIG. 9 is a schematic diagram of a 1490m elevation-based cutting profile according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "central," "longitudinal," "lateral," "length," "width," "thickness," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," "clockwise," "counterclockwise," "axial," "radial," "circumferential," and the like are used in the orientations and positional relationships indicated in the drawings for convenience in describing the invention and to simplify the description, and are not intended to indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and are therefore not to be considered limiting of the invention.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
The underground iron ore belongs to medium-grade high-sulfur low-phosphorus vanadium-titanium magnetite, is rich in vanadium-titanium resources and has extremely high mining value. The ore body is nearly east-west and has a north inclination angle of 50-60 degrees, and the ore body is produced in a monoclinic lamellar shape, a lamellar shape and a lens shape. According to the mining technical conditions, open-pit mining is adopted at the early stage of the underground iron ore, the mine is shifted to the underground mining stage at present, the adopted mining method is a sill pillar-free sublevel caving method, the layering height is 20m, two sections of road sections of the highway of the area are arranged right above the ore body and are respectively positioned at the north part and the west part of the ore body, and the moving range of the surface part building structure from the mining rock stratum is closer, and the range of the safety pillar of the road and the surface building structure and the stability of the open slope are considered. The invention provides a method for delineating the range of an open-pit-to-underground security pillar, which is shown in figure 1 and comprises the following steps:
step 1: determining a safety collapse zone
The length of the safety collapse zone is not less than 5 times of the distance between the safety collapse zone and the protected object, and the safety collapse zone is representative. In this embodiment, for a road protection object, according to a road of a section to be protected, corresponding standards and specifications are checked, and it is determined that a collapse allowing band is 20m away from an outer contour of the road, and the length of the collapse band is 1311m, as shown in fig. 2.
Step 2: fitting to surface DTM surface
The mine is an open-to-underground mine, so that an open pit exists on the surface, and therefore the safety collapse zone obtained in step 1 is fitted to the surface DTM surface including the open pit, so that at least 90% of the points on the collapse zone fall on the DTM surface, and the range of the surface DTM surface is greater than the range of the deposit, as shown in fig. 3.
And step 3: extracting fitting curves
On the basis of step 2, a fitted curve is extracted, as shown in fig. 4.
And 4, step 4: the fitted curve expands downward. And (4) expanding the fitted curve obtained in the step (3) downwards by 40m height according to the rock movement angle of 60 degrees to obtain a derivation curve, as shown in fig. 5.
And 5: rapid generation of DTM surfaces
In 3d mine, based on the function of generating the DTM surface, the DTM surface is quickly generated by the extrapolated curve in step 4 and the fitted curve obtained in step 3, and is numbered as m (the initial value of m is 1), as shown in fig. 6.
Step 6: forming a horizontal section line of 1570m
The DTM face No. 1 was cut based on elevation 1570m, forming horizontal section lines of 1570m, as shown in fig. 7.
And 7: judging whether the section line penetrates through the No. 1 DTM surface
1570m horizontal section line has run through DTM plane No. 1, so it is necessary to combine the section line with the spillover boundary, which is the left (right) side of the intersection point of the curve with the larger horizontal elevation and the curve with the smaller horizontal elevation after the section plane intersects the two curves (the fitted curve and the derived curve), to form a new fitted curve (combined line), and to use the clean-up and debug functions for the new fitted curve, as shown in fig. 7 and 8.
And returning the fitted curve after the fitting curve is verified to be reasonable to the step 4, and starting a new cycle. In step 5, a new fitted curve formed at the level of 1570m and a derivative curve formed according to the new fitted curve are combined to generate a DTM surface No. 2, the process is strictly executed according to the steps and the judgment standard, and when a cutting section line is formed at the level of 1490m, the section line does not penetrate through the corresponding DTM surface, so that the next operation is performed, as shown in fig. 9.
And 8: obtaining a theoretical boundary of a security pillar
The section line at 1490m elevation was cleaned and debugged, the redundant points were removed, the nail angle (angle less than 5 °) was removed, and the trimmed planform curve was used as the initial line to derive the boundaries of each mining level security pillar. The height difference between each production level and the 1490m level was calculated. And according to each calculated height difference value, deducing the trimmed 1490m horizontal section line to each mining level from top to bottom at a rock movement angle of 60 degrees, wherein a curve obtained at each level is the theoretical boundary of the security pillar.
And step 9: obtaining security pillar boundaries
The safety pillar theoretical boundaries are optimized for safety, based on the existing project of the mine and future major project placement plans and geological structures. The optimization specific requirements are as follows: (1) the boundary line segments are formed by folding lines which are horizontal, flat and vertical, and the folding lines are as few as possible; (2) each level of critical engineering and facility priority; (3) the boundary is simple, and the high-grade ore in the security ore pillar range is less, and the actual security ore pillar range of each level of the iron ore is obtained through the processes.
The method combines software, theory and actual engineering, and compared with a method for deducing the boundary of the security pillar in one step directly according to the rock movement angle, the security pillar obtained by the method is smoother and simpler, is more convenient for security pillar retention construction, and is beneficial to recovery of security pillar resources. The invention has the characteristics of safety, economy, applicability and the like.
Any embodiment disclosed herein above is meant to disclose, unless otherwise indicated, all numerical ranges disclosed as being preferred, and any person skilled in the art would understand that: the preferred ranges are merely those values which are obvious or representative of the technical effect which can be achieved. Since the numerical values are too numerous to be exhaustive, some of the numerical values are disclosed in the present invention to illustrate the technical solutions of the present invention, and the above-mentioned numerical values should not be construed as limiting the scope of the present invention.
Meanwhile, if the invention as described above discloses or relates to parts or structural members fixedly connected to each other, the fixedly connected parts can be understood as follows, unless otherwise stated: a detachable fixed connection (for example using bolts or screws) is also understood as: non-detachable fixed connections (e.g. riveting, welding), but of course, fixed connections to each other may also be replaced by one-piece structures (e.g. manufactured integrally using a casting process) (unless it is obviously impossible to use an integral forming process).
In addition, terms used in any technical solutions disclosed in the present invention to indicate positional relationships or shapes include approximate, similar or approximate states or shapes unless otherwise stated. Any part provided by the invention can be assembled by a plurality of independent components or can be manufactured by an integral forming process.
The above examples are merely illustrative for clearly illustrating the present invention and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. Nor is it intended to be exhaustive of all embodiments. And obvious variations or modifications of the invention may be made without departing from the scope of the invention.

Claims (6)

1. A method for delineating the range of an open pit to an underground security pillar is characterized by comprising the following steps:
step 1, determining a safety collapse zone
Aiming at a protected object, checking corresponding standards and specifications, and determining the position and the length of a safety collapse zone;
step 2, fitting with a ground surface DTM surface
Fitting the safety collapse zone obtained in the step (1) with a surface DTM surface comprising an open pit so that points on the collapse zone fall on the surface DTM surface as far as possible;
and step 3: extracting fitting curves
Extracting a fitting curve on the basis of fitting the safe collapse zone and the ground surface DTM surface;
step 4, downward expansion of the fitted curve
Expanding the fitted curve obtained in the step 3 downwards by a height of 2h according to the rock movement angle theta to obtain a derivation curve; wherein h is the segment height;
step 5, rapidly generating DTM surface
Rapidly generating a DTM surface in 3DMine software based on the derivation curve obtained in the step 4 and the fitting curve obtained in the step 3, numbering the DTM surface as m, and setting the initial value of m as 1;
step 6, forming H 0 Horizontal section line of-mh
Based on elevation H 0 Mh cutting DTM face forming H 0 Horizontal section line of-mh, H 0 The average elevation of the earth surface;
step 7, judging whether the section line penetrates through the DTM surface
If the curve is intersected, combining the section line and the overflow boundary to form a new fitting curve, making m equal to m +1, returning to the step 4, forming a DTM surface by the new fitting curve and a derivation curve of the new fitting curve in the step 5, and sequentially performing other steps; if the section line does not penetrate through the DTM surface, entering the next step;
the overflow boundary is a part on the left side or the right side of the intersection point of the curve with the large horizontal elevation and the curve with the small horizontal elevation after the section line is intersected with the two curves;
step 8, obtaining the theoretical boundary of the security pillar
By deleting redundant point and t-corner pairs H 0 -mh horizontal section lines are trimmed, and each horizontal security pillar theoretical boundary is deduced by using the trimmed plane curves;
and step 9: obtaining security pillar boundaries
And (4) optimizing the boundary of the step (8) according to the actual engineering arrangement, medium and long term mining plan and the principle of simplicity and convenience in construction to obtain a more reasonable boundary of the security pillar.
2. The method for delineating the range of an open-pit to underground security pillar according to claim 1, wherein: in the step 1, the length of the arc-shaped curve formed by the safety collapse zone according to the outer contour of the protected object is not less than 5 times of the distance between the safety collapse zone and the protected object.
3. The method for delineating the range of an open-pit to an underground security pillar according to claim 1, wherein: and 2, the range of the surface DTM surface is larger than the range of the ore deposit.
4. The method for delineating the range of an open-pit to an underground security pillar according to claim 1, wherein: at least 90% of the points on the collapsed zone in step 2 fall on the surface DTM surface.
5. The method for delineating the range of an open-pit to an underground security pillar according to claim 1, wherein: and 9, the actual engineering comprises development engineering, mining accurate engineering, mine medium and long term planning and geological structure.
6. The method for delineating the range of an open-pit to an underground security pillar according to claim 1, wherein: the protection objects in the step 1 comprise building structures, roads and other natural protection landscapes.
CN202210639890.5A 2022-06-08 2022-06-08 Method for delineating range of open-air-to-underground security pillar Active CN115063546B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210639890.5A CN115063546B (en) 2022-06-08 2022-06-08 Method for delineating range of open-air-to-underground security pillar

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210639890.5A CN115063546B (en) 2022-06-08 2022-06-08 Method for delineating range of open-air-to-underground security pillar

Publications (2)

Publication Number Publication Date
CN115063546A true CN115063546A (en) 2022-09-16
CN115063546B CN115063546B (en) 2024-04-02

Family

ID=83199929

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210639890.5A Active CN115063546B (en) 2022-06-08 2022-06-08 Method for delineating range of open-air-to-underground security pillar

Country Status (1)

Country Link
CN (1) CN115063546B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007264952A (en) * 2006-03-28 2007-10-11 Fujitsu Fip Corp Ground-analyzing mesh generation method and ground-analyzing mesh generation program
CN103047970A (en) * 2012-12-18 2013-04-17 中国矿业大学(北京) Method for determining damage boundary of subsided farmland
CN106339528A (en) * 2016-08-09 2017-01-18 鞍钢集团矿业有限公司 Method for forecasting range of surface movement induced by underground mining of open-pit iron mine end slope
KR101820126B1 (en) * 2017-10-26 2018-01-18 태양정보시스템(주) Error range adjustment drawing system using real time correcting of spatial imagery dawing image
CN111695790A (en) * 2020-05-26 2020-09-22 中钢集团山东矿业有限公司 Mining method for security pillar
CN111750822A (en) * 2019-10-31 2020-10-09 河南理工大学 Coal mining induced overlying strata and surface subsidence collaborative dynamic prediction method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007264952A (en) * 2006-03-28 2007-10-11 Fujitsu Fip Corp Ground-analyzing mesh generation method and ground-analyzing mesh generation program
CN103047970A (en) * 2012-12-18 2013-04-17 中国矿业大学(北京) Method for determining damage boundary of subsided farmland
CN106339528A (en) * 2016-08-09 2017-01-18 鞍钢集团矿业有限公司 Method for forecasting range of surface movement induced by underground mining of open-pit iron mine end slope
KR101820126B1 (en) * 2017-10-26 2018-01-18 태양정보시스템(주) Error range adjustment drawing system using real time correcting of spatial imagery dawing image
CN111750822A (en) * 2019-10-31 2020-10-09 河南理工大学 Coal mining induced overlying strata and surface subsidence collaborative dynamic prediction method
CN111695790A (en) * 2020-05-26 2020-09-22 中钢集团山东矿业有限公司 Mining method for security pillar

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
杨宇江;李元辉;尹国光;韩洪江;: "露天转地下开采境界矿柱安全厚度稳定性分析", 东北大学学报(自然科学版), no. 07, 15 July 2011 (2011-07-15) *
杨鹏;张东红;张兵;张晋军;王贻明;: "谦比希铜矿露天转地下开采保安矿柱稳定性分析", 化工矿物与加工, no. 03, 15 March 2017 (2017-03-15) *
管佳林: "深部地压分析及安全开采顺序研究", 《中国优秀硕士学位论文全文数据库工程科技Ⅰ辑》, 31 May 2014 (2014-05-31), pages 021 - 145 *
邓红卫;胡普仑;周科平;杨念哥: "采场结构参数敏感性正交数值模拟试验研究", 《中南大学学报(自然科学版)》, 26 June 2013 (2013-06-26), pages 2463 - 2469 *

Also Published As

Publication number Publication date
CN115063546B (en) 2024-04-02

Similar Documents

Publication Publication Date Title
CN104314570B (en) Long thick ore body Wall ore reclaims and the transitional exploitation method of open air trestle
CN109993832B (en) Method for constructing refined three-dimensional model of fully mechanized coal mining face coal seam
CN103277106B (en) Highway tunnel three-step five-procedure excavation construction method
CN106247877B (en) A kind of hypervelocity symmetrically forces kerve method without cutting hole deviation line
CN102913249A (en) Inclined shaft transverse-through positive hole single horn lifting construction method
CN107130969B (en) A kind of inclined shaft and main hole intersection substep Enlargement excavation method
CN113420457B (en) End slope stability analysis method for steep slope mining of open pit coal mine
CN105821817A (en) Method for excavating semicircular dome of giant cylindrical surge chamber
CN110118085A (en) A kind of compound advanced secondary tunneling method in two lane of top working face of large mining depth high working face
CN115063546A (en) Method for delineating range of security pillar from open air to underground
CN105970966B (en) A kind of excavation construction method of extra-high arch dam foundation weakness disturbed belt
CN110469348B (en) BIM technology-based underground tunnel large curve turning steel grid arrangement method
CN111810184A (en) Variable cross-section tunnel construction method
CN112253208A (en) Ventilation patio improved by using pedestrian well of mine stope and improvement method thereof
CN216974878U (en) Landslide accumulation body tunnel top-picking composite reinforcing ring
CN106285677A (en) Side back production subregion filling studding recovery method is expanded to route on Chao Qian
CN102434162A (en) Panel tailing filling mining method
CN110700285B (en) Three-dimensional design method for relieving slope of surface unconsolidated formation of strip mine
CN115062377A (en) Simulation research method for global pressure relief characteristic of roof-cutting pressure relief goaf
CN111287749B (en) Anti-impact method for wide excavation and narrow excavation of rock burst coal seam near-empty roadway
CN105386767B (en) A kind of barnyard avalanche mixed mining hangs the mining methods of side
CN113047838A (en) Fine and safe stoping method for mining stagnant and retained gallery ore by subsection or stage open stope method
CN114165236A (en) Middle-section bidirectional rock drilling centralized ore removal mining method
CN111680261A (en) Setting method and setting system for protecting coal pillar
CN113032887B (en) Method for realizing precise calibration and detection of super-large chamber based on VULCAN platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant